Notsoluckycharm6
Beta member
- Messages
- 1
Well, not exactly corporate, but it is business.
Issue:
User 1 uses a tax program to do company and personal taxes, all checks out.
unknown user, possibly system administration, comes in later and modifies this information on file ( REMOTELY )
User 1 gets in trouble.
User 1 needs to clear herself, and or catch the culpurit.
The network is a half *** set up really, a P2P network with one "Server" only acting as a hub.
We were thinking of a key logger solution, but would that log an intruders use? I would think no, but have no personal experience using key loggers.
Any suggestions?
By the way, great forums! Just registered.
Issue:
User 1 uses a tax program to do company and personal taxes, all checks out.
unknown user, possibly system administration, comes in later and modifies this information on file ( REMOTELY )
User 1 gets in trouble.
User 1 needs to clear herself, and or catch the culpurit.
The network is a half *** set up really, a P2P network with one "Server" only acting as a hub.
We were thinking of a key logger solution, but would that log an intruders use? I would think no, but have no personal experience using key loggers.
Any suggestions?
By the way, great forums! Just registered.